{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-44983","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-08-21T05:34:56.670Z","datePublished":"2024-09-04T19:54:32.830Z","dateUpdated":"2025-11-03T22:14:31.584Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:30:18.420Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: validate vlan header\n\nEnsure there is sufficient room to access the protocol field of the\nVLAN header, validate it once before the flowtable lookup.\n\n=====================================================\nBUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32\n nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]\n nf_ingress net/core/dev.c:5440 [inline]"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/nf_flow_table_inet.c","net/netfilter/nf_flow_table_ip.c"],"versions":[{"version":"4cd91f7c290f64fe430867ddbae10bff34657b6a","lessThan":"c05155cc455785916164aa5e1b4605a2ae946537","status":"affected","versionType":"git"},{"version":"4cd91f7c290f64fe430867ddbae10bff34657b6a","lessThan":"d9384ae7aec46036d248d1c2c2757e471ab486c3","status":"affected","versionType":"git"},{"version":"4cd91f7c290f64fe430867ddbae10bff34657b6a","lessThan":"0279c35d242d037abeb73d60d06a6d1bb7f672d9","status":"affected","versionType":"git"},{"version":"4cd91f7c290f64fe430867ddbae10bff34657b6a","lessThan":"043a18bb6cf16adaa2f8642acfde6e8956a9caaa","status":"affected","versionType":"git"},{"version":"4cd91f7c290f64fe430867ddbae10bff34657b6a","lessThan":"6ea14ccb60c8ab829349979b22b58a941ec4a3ee","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/nf_flow_table_inet.c","net/netfilter/nf_flow_table_ip.c"],"versions":[{"version":"5.13","status":"affected"},{"version":"0","lessThan":"5.13","status":"unaffected","versionType":"semver"},{"version":"5.15.166","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.107","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.48","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.10.7","lessThanOrEqual":"6.10.*","status":"unaffected","versionType":"semver"},{"version":"6.11","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"5.15.166"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.1.107"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.6.48"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.10.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c05155cc455785916164aa5e1b4605a2ae946537"},{"url":"https://git.kernel.org/stable/c/d9384ae7aec46036d248d1c2c2757e471ab486c3"},{"url":"https://git.kernel.org/stable/c/0279c35d242d037abeb73d60d06a6d1bb7f672d9"},{"url":"https://git.kernel.org/stable/c/043a18bb6cf16adaa2f8642acfde6e8956a9caaa"},{"url":"https://git.kernel.org/stable/c/6ea14ccb60c8ab829349979b22b58a941ec4a3ee"}],"title":"netfilter: flowtable: validate vlan header","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:14:31.584Z"}}]}}